The challenges of Digital Evidence usage in Deepfake Crimes Era
Corresponding Author(s) : Judge. Mohamed Hassan Mekkawi
Journal of Law and Emerging Technologies,
Vol. 3 No. 2 (2023)
Abstract
This research paper discusses the challenges of digital evidence usage in Deepfake crimes era in both the Egyptian and US Legislations. There is no doubt about the importance of keeping pace with the Law with behaviors that pose a threat to fundamental interests that deserve protection, especially in an era when information technology is instantaneously accelerating towards the creation of many modern technologies that raise many concerns, since artificial intelligence algorithms have helped to think about a large number of issues that did not exist a few years ago, such as the ease of processing big data and simultaneous machine translation, and one of those algorithms is Deepfake, which was classified as the most dangerous among artificial intelligence algorithms on Cybersecurity threats. With the complexity of Investigations of computer related crimes, due to the obstacles in gathering the evidence. The researcher seeks, after discussing the essence of digital evidence, stating its types, forms, characteristics, sources, principles, and challenges facing its application, as well as comparing between the laws regulating the digital evidence nationally, internationally concerning (Budapest convention) and The US federal rules of digital evidence, to present and set recommendations to reduce the risks and challenges of these crimes, and to assist the legislator in addressing the shortcomings in Egyptian laws.
Keywords: Digital evidence, Deepfake, Cybercrime, Digital privacy & Cybersecurity.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- Legislations
- Convention on Cybercrime, Budapest, 23.XI.2001
- Code of Virginia, § 18.2-386.2.
- Texas-2019-SB751-
- California Election Code § 20010
- The Egyptian constitution 2014 amended in 2019
- The Penal code no 58 of 1937
- Anti-Cyber and Information Technology Crimes Law No. 175 of 2018
- Books and Articles
- Abdel Fattah Bayoumi Hijazi (2009) Digital Evidence and Forgery in Computer and Internet Crimes, An In-depth Study of Computer and Internet Crimes, Bahjat for Printing and Binding
- Ahmed Abdel-Mawgoud Zakir (2022) The crime of deep pornographic counterfeiting, a comparative study, The Legal Journal, Cairo University Faculty of Law, Khartoum Branch, Volume 11, Issue 7
- Ahmed Awad Bilal (2013) The Rule of Excluding Illegally Obtained Evidence in Comparative Criminal Procedures, 3rd Edition Dar Al-Nahda Al-Arabia
- Ahmed Fathy Sorour (2015) The Mediator in Penal Law, General Section, Sixth Edition, Cairo, Dar Al-Nahda Al-Arabiya
- Aju D, Anil Kumar Kakelli and Kishore Rajendiran (2021) A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends, Confluence of AI, Machine, and Deep Learning in Cyber Forensics, premiere reference resource
- Andrii Skrypnyk and Ivan Titko (2019) Use of Information from Electronic Media in Criminal Proceeding of Several European States: Comparative Legal Research SOCRATES University Faculty of Law Electronic Scientific Journal of Law 3(15): DOI: https://doi.org/10.25143/socr.15.2019.3.008-023
- Ani petrosyan (2023) Worldwide digital population 2023, Statista
- Anna-Maria Osula and Mark Zoetekouw (2017) The Notification Requirement in Transborder Remote Search and Seizure: Domestic and International Law Perspectives. 11 Masaryk University Journal of Law and Technology DOI: https://doi.org/10.5817/MUJLT2017-1-6
- Ashley Dean (2020) Deepfakes, Pose Detection, and the Death of “Seeing is Believing”, Law and Technology Today
- Betül Çolak (2021) Legal Issues of Deepfakes, The institute of Internet & the just society
- Brett Lantz (2015) Machine Learning with R, Packt Publishing Limited; 2 edition
- Chet Hosmer (2002) Proving the Integrity of Digital Evidence with Time, 1st Int’l J. Of Digital Evidence
- Cybercrime Convention committee (T-CY) (2013) T-CY Guidance Note, Critical information infrastructure attacks, adopted by the 9th plenary of the T-CY june
- David Mugisha (2019) DIGITAL FORENSICS: Digital Evidence In Judicial System, International Journal of Cyber Criminology
- Dawn Lomer (2016) 15 Types of Evidence and How to Use Them, I SIGHT
- Delphine Baize (1999) De la contrefaçon à l'imitation, revue française de gestion, juin-juillet-aout
- Don Mason (2013) Digital Evidence and Computer Forensics, National Center for Justice and the Rule of Law
- Emad Sayed Haidar (2018) Primary Investigation of Computer Crimes, Ph.D. Thesis, Faculty of Law, Cairo University
- Eoghan Casey (2016) Focused Digital Evidence Analysis And Forensic Distinguishers 18 Digital Investigation DOI: https://doi.org/10.1016/j.diin.2016.08.004
- Gamil Abdel-Baki Al-Saghir (2001) Procedural aspects related to the Internet, Dar Al-Nahda Al-Arabiya
- Gavin manes, Elizabeth Downing, Lance Watson and Christopher Thrutchley (2007) New Federal Rules and Digital Evidence, Annual ADFSL conference on digital forencsics, security and Law
- Jean-Philippe Aumasson (2018) serious Cryptography A Practical Introduction to Modern Encryption, San Francisco,
- Jerry Norton, evidence meaning, The Editors of Encyclopaedia Britannica
- John Letzing (2021) How to tell reality from a deepfake, World Economic Forum
- Khaled Mamdouh Ibrahim (2009) Informational Crimes, 1st edition, Alexandria: University Thought House
- Larry E. Daniel and Lars E. Daniel (2012) Digital Forensics for Legal Professionals, Understanding Digital Evidence From The Warrant To The Courtroom, 1st edition, Syngress DOI: https://doi.org/10.1016/B978-1-59749-643-8.00003-1
- Mahmoud Salama Al-Sherif (2022) revenge porn crime through deep falsification and criminal responsibility for it, Journal of the Faculty of Law for Legal and Economic Research, Faculty of Law, Alexandria University
- Mamdouh Abd al-Hamid Abd al-Muttalib (2003) a proposed model for the rules for adopting digital evidence of evidence in computer crimes, published within the proceedings of the banking and electronic business conference organized by the Faculty of Sharia and Law at the United Arab Emirates University and the Dubai Chamber of Commerce and Industry,
- Martin Novak (2020) Digital Evidence in Criminal Cases Before the U.S. Courts of Appeal: Trends and Issues for Consideration, Journal of Digital Forensics Security and Law, Volume 14 Number 4 DOI: https://doi.org/10.15394/jdfsl.2019.1609
- Mazen Abbas (2022) Destroying Digital Evidence: Technical and Legal Dimensions, Master thesis, Cybercrime investigations professional master, Faculty of Law, British University in Egypt
- Mika Westerlund (2019) The Emergence of Deepfake Technology: A Review, Technology Innovation Management Review 9, no. 11 DOI: https://doi.org/10.22215/timreview/1282
- Mohamed El-Guindy (2021). Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism. Journal of Law and Emerging Technologies, 1(1), DOI: https://doi.org/10.54873/jolets.v1i1.32
- Mohamed Hassan Mekkawi (2022) Digital Privacy in International Law and International conventions, Journal of Media Research and Studies, Issue Twenty
- Mohamed Hassan Mekkawi (2023) Cyber blackmail between threats and protection: A study of the Egyptian and American Legislation, Journal of Law and Emerging Technology (JOLETS), Volume 2, Issue 2 DOI: https://doi.org/10.54873/jolets.v2i2.71
- Piotr Lewulis (2022) Collecting Digital Evidence from Online Sources: Deficiencies in Current Polish Criminal Law, Criminal Law Law Forum33, Springer DOI: https://doi.org/10.1007/s10609-021-09430-4
- Ramses Benham, (1971) The General Theory of Criminal Law, Alexandria, Origin of Knowledge publishing
- Rashad Rasras, Ziad Alkadi, and Mutaz Rasmi (2019) A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages, Engineering technology and applied science researches,
- Roman Dremliuga and Alexander Korobeev (2021) A Fight Against the Dissemination of Deepfakes in Other Countries: Criminal and Criminological Aspects, July 2021 Russian Journal of Criminology 15(3) DOI: https://doi.org/10.17150/2500-4255.2021.15(3).372-379
- S.Suguna, V.Dhanakoti, and R.Manjupriya (2016) A Study on Symmetric and Asymmetric key encryption algorithms, International Research Journal of Engineering and Technology (IRJET),
- Sabika Tasneem & Sidra Jabeen (2022) How to Overcome Major Problems in Handling Digital Evidence?, VIDIZMO
- Standard opereating procedures for the collection, analysis and presentation of electronic evidence
- Tarik Sorour (2010) Explanation of the Penal Code Special Section, Crimes of Persons and Money, second edition, Dar Al-Nahda Al-Arabiya
- The committee on the judiciary house of representatives, Federal Rules of Evidence, 2014
- William Y. Arms, Christophe Blanchi and Edward A. Overly (1997) An Architecture for Information in Digital Libraries, D-Lib Magazine,
- Xandra E. Kramer (2018) Challenges of Electronic Taking of Evidence: Old Problems in a New Guise and New Problems in Disguise Il Conferencia Internacional & XXVI Jornadas Iberoamericanas de Derecho Procesal IIDP & IAPL, La Prueba en el Proceso / Evidence in the process Atelier 2018
- Yuezun Li and Siwei Lyu (2019) Exposing DeepFake Videos by Detecting Face Warping Artifacts
- Zachary Roush (2022) Digital Forensics: Data Recovery and Steps You Can Take to Assist in the Recovery Effort, JDSPURA
References
Legislations
Convention on Cybercrime, Budapest, 23.XI.2001
Code of Virginia, § 18.2-386.2.
Texas-2019-SB751-
California Election Code § 20010
The Egyptian constitution 2014 amended in 2019
The Penal code no 58 of 1937
Anti-Cyber and Information Technology Crimes Law No. 175 of 2018
Books and Articles
Abdel Fattah Bayoumi Hijazi (2009) Digital Evidence and Forgery in Computer and Internet Crimes, An In-depth Study of Computer and Internet Crimes, Bahjat for Printing and Binding
Ahmed Abdel-Mawgoud Zakir (2022) The crime of deep pornographic counterfeiting, a comparative study, The Legal Journal, Cairo University Faculty of Law, Khartoum Branch, Volume 11, Issue 7
Ahmed Awad Bilal (2013) The Rule of Excluding Illegally Obtained Evidence in Comparative Criminal Procedures, 3rd Edition Dar Al-Nahda Al-Arabia
Ahmed Fathy Sorour (2015) The Mediator in Penal Law, General Section, Sixth Edition, Cairo, Dar Al-Nahda Al-Arabiya
Aju D, Anil Kumar Kakelli and Kishore Rajendiran (2021) A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends, Confluence of AI, Machine, and Deep Learning in Cyber Forensics, premiere reference resource
Andrii Skrypnyk and Ivan Titko (2019) Use of Information from Electronic Media in Criminal Proceeding of Several European States: Comparative Legal Research SOCRATES University Faculty of Law Electronic Scientific Journal of Law 3(15): DOI: https://doi.org/10.25143/socr.15.2019.3.008-023
Ani petrosyan (2023) Worldwide digital population 2023, Statista
Anna-Maria Osula and Mark Zoetekouw (2017) The Notification Requirement in Transborder Remote Search and Seizure: Domestic and International Law Perspectives. 11 Masaryk University Journal of Law and Technology DOI: https://doi.org/10.5817/MUJLT2017-1-6
Ashley Dean (2020) Deepfakes, Pose Detection, and the Death of “Seeing is Believing”, Law and Technology Today
Betül Çolak (2021) Legal Issues of Deepfakes, The institute of Internet & the just society
Brett Lantz (2015) Machine Learning with R, Packt Publishing Limited; 2 edition
Chet Hosmer (2002) Proving the Integrity of Digital Evidence with Time, 1st Int’l J. Of Digital Evidence
Cybercrime Convention committee (T-CY) (2013) T-CY Guidance Note, Critical information infrastructure attacks, adopted by the 9th plenary of the T-CY june
David Mugisha (2019) DIGITAL FORENSICS: Digital Evidence In Judicial System, International Journal of Cyber Criminology
Dawn Lomer (2016) 15 Types of Evidence and How to Use Them, I SIGHT
Delphine Baize (1999) De la contrefaçon à l'imitation, revue française de gestion, juin-juillet-aout
Don Mason (2013) Digital Evidence and Computer Forensics, National Center for Justice and the Rule of Law
Emad Sayed Haidar (2018) Primary Investigation of Computer Crimes, Ph.D. Thesis, Faculty of Law, Cairo University
Eoghan Casey (2016) Focused Digital Evidence Analysis And Forensic Distinguishers 18 Digital Investigation DOI: https://doi.org/10.1016/j.diin.2016.08.004
Gamil Abdel-Baki Al-Saghir (2001) Procedural aspects related to the Internet, Dar Al-Nahda Al-Arabiya
Gavin manes, Elizabeth Downing, Lance Watson and Christopher Thrutchley (2007) New Federal Rules and Digital Evidence, Annual ADFSL conference on digital forencsics, security and Law
Jean-Philippe Aumasson (2018) serious Cryptography A Practical Introduction to Modern Encryption, San Francisco,
Jerry Norton, evidence meaning, The Editors of Encyclopaedia Britannica
John Letzing (2021) How to tell reality from a deepfake, World Economic Forum
Khaled Mamdouh Ibrahim (2009) Informational Crimes, 1st edition, Alexandria: University Thought House
Larry E. Daniel and Lars E. Daniel (2012) Digital Forensics for Legal Professionals, Understanding Digital Evidence From The Warrant To The Courtroom, 1st edition, Syngress DOI: https://doi.org/10.1016/B978-1-59749-643-8.00003-1
Mahmoud Salama Al-Sherif (2022) revenge porn crime through deep falsification and criminal responsibility for it, Journal of the Faculty of Law for Legal and Economic Research, Faculty of Law, Alexandria University
Mamdouh Abd al-Hamid Abd al-Muttalib (2003) a proposed model for the rules for adopting digital evidence of evidence in computer crimes, published within the proceedings of the banking and electronic business conference organized by the Faculty of Sharia and Law at the United Arab Emirates University and the Dubai Chamber of Commerce and Industry,
Martin Novak (2020) Digital Evidence in Criminal Cases Before the U.S. Courts of Appeal: Trends and Issues for Consideration, Journal of Digital Forensics Security and Law, Volume 14 Number 4 DOI: https://doi.org/10.15394/jdfsl.2019.1609
Mazen Abbas (2022) Destroying Digital Evidence: Technical and Legal Dimensions, Master thesis, Cybercrime investigations professional master, Faculty of Law, British University in Egypt
Mika Westerlund (2019) The Emergence of Deepfake Technology: A Review, Technology Innovation Management Review 9, no. 11 DOI: https://doi.org/10.22215/timreview/1282
Mohamed El-Guindy (2021). Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism. Journal of Law and Emerging Technologies, 1(1), DOI: https://doi.org/10.54873/jolets.v1i1.32
Mohamed Hassan Mekkawi (2022) Digital Privacy in International Law and International conventions, Journal of Media Research and Studies, Issue Twenty
Mohamed Hassan Mekkawi (2023) Cyber blackmail between threats and protection: A study of the Egyptian and American Legislation, Journal of Law and Emerging Technology (JOLETS), Volume 2, Issue 2 DOI: https://doi.org/10.54873/jolets.v2i2.71
Piotr Lewulis (2022) Collecting Digital Evidence from Online Sources: Deficiencies in Current Polish Criminal Law, Criminal Law Law Forum33, Springer DOI: https://doi.org/10.1007/s10609-021-09430-4
Ramses Benham, (1971) The General Theory of Criminal Law, Alexandria, Origin of Knowledge publishing
Rashad Rasras, Ziad Alkadi, and Mutaz Rasmi (2019) A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages, Engineering technology and applied science researches,
Roman Dremliuga and Alexander Korobeev (2021) A Fight Against the Dissemination of Deepfakes in Other Countries: Criminal and Criminological Aspects, July 2021 Russian Journal of Criminology 15(3) DOI: https://doi.org/10.17150/2500-4255.2021.15(3).372-379
S.Suguna, V.Dhanakoti, and R.Manjupriya (2016) A Study on Symmetric and Asymmetric key encryption algorithms, International Research Journal of Engineering and Technology (IRJET),
Sabika Tasneem & Sidra Jabeen (2022) How to Overcome Major Problems in Handling Digital Evidence?, VIDIZMO
Standard opereating procedures for the collection, analysis and presentation of electronic evidence
Tarik Sorour (2010) Explanation of the Penal Code Special Section, Crimes of Persons and Money, second edition, Dar Al-Nahda Al-Arabiya
The committee on the judiciary house of representatives, Federal Rules of Evidence, 2014
William Y. Arms, Christophe Blanchi and Edward A. Overly (1997) An Architecture for Information in Digital Libraries, D-Lib Magazine,
Xandra E. Kramer (2018) Challenges of Electronic Taking of Evidence: Old Problems in a New Guise and New Problems in Disguise Il Conferencia Internacional & XXVI Jornadas Iberoamericanas de Derecho Procesal IIDP & IAPL, La Prueba en el Proceso / Evidence in the process Atelier 2018
Yuezun Li and Siwei Lyu (2019) Exposing DeepFake Videos by Detecting Face Warping Artifacts
Zachary Roush (2022) Digital Forensics: Data Recovery and Steps You Can Take to Assist in the Recovery Effort, JDSPURA